Sciweavers

107 search results - page 17 / 22
» An Analysis and Feedback Infrastructure for Argumentation Le...
Sort
View
AAAI
2008
13 years 9 months ago
Proactive Intrusion Detection
Machine learning systems are deployed in many adversarial conditions like intrusion detection, where a classifier has to decide whether a sequence of actions come from a legitimat...
Benjamin Liebald, Dan Roth, Neelay Shah, Vivek Sri...
CATE
2004
133views Education» more  CATE 2004»
13 years 8 months ago
Semi-Automatic Evaluation Features in Computer-assisted Essay Assessment
The role of assessment and evaluation has recently changed in a way which will have fundamental consequences in applying information and communication technologies (ICTs) to analy...
Tuomo Kakkonen, Niko Myller, Erkki Sutinen
CN
2007
168views more  CN 2007»
13 years 7 months ago
A MAC layer power management scheme for efficient energy delay tradeoff in a WLAN
— Energy efficient operation is of paramount importance for battery-powered wireless nodes. In an effort to conserve energy, standard protocols for WLANs have the provision for w...
Mahasweta Sarkar, Rene L. Cruz
ENVSOFT
2007
166views more  ENVSOFT 2007»
13 years 7 months ago
The implications of complexity for integrated resources management
: Integrated environmental resources management is a purposeful activity with the goal to maintain and improve the state of an environmental resource affected by human activities. ...
C. Pahl-Wostl
ICSE
2004
IEEE-ACM
14 years 7 months ago
MSR 2004: International Workshop on Mining Software Repositories
A one-day workshop was held on the topic of mining software repositories at ICSE 2004 in Edinburgh, Scotland. The workshop brought together researchers and practitioners in order ...
Ahmed E. Hassan, Richard C. Holt, Audris Mockus